1128. Chapter 1128 Source Leakage (2)
From Sony's "email door" in 2014, to last month when Netflix and other video sites and TV stations were threatened to leak more than 40 episodes, and now to the current experience of New Era Films itself, Hollywood seems to have become a hacker extortion A big blackmailer, or a cash machine for hackers.
On the eve of the annual Oscar awards season, it is also called the "Oscar resource season" by the old American drama with rich entertainment spirit. There are often many popular movies that have just been released or have not yet been released. Posted on pirate sites.
As the film industry digitizes production, such leaks are repeated.
But there is no good solution, not to mention New Era Pictures, even a veteran giant like Disney can't find any perfect solution
Whether it is for F~B~I or the network security department of an Internet company, tracking the source of hackers is always the most difficult case. Hackers are very sensitive to domain names. For example, an Egyptian hacker may use a polar bear IP to carry out network attacks, and it is almost impossible to find the real source.
Generally speaking, big companies like Disney, Netflix, and NBC Universal have good information security teams, but you can't guarantee that their suppliers or small contract companies are also safe, and they have insufficient budget in this regard. It is easy for hackers to invade, so as long as there is a leak of film sources, it is mostly because of pig teammates who follow the downstream of the industry chain.
Of course, this conclusion is not absolute. After all, Sony's "email door" incident the year before last has been brought up to this day.
At the end of 2014, a picture of a red skull suddenly appeared on the monitors of all office computers in Sony Pictures Films. This was a threatening message from an organization called "Peace Guard", demanding that Sony stop releasing the movie "Assassination of ***" , Later, conspiracy theories speculated that the main messenger behind this incident was the Beibang ZF.
A few days later, these hackers invaded Sony's computer system again, and the display on the computer screen changed to "Erasure Sony from the earth."
Not only that, hackers also stole as much as 100TB of massive data from within Sony, including Sony employee information, internal contracts, financial reports, scripts that have not yet started filming, Hollywood stars' remuneration, and five movies that have been filmed but have not yet been screened. Movie HD version.
This incident was called "the Hollywood version of the Snowden incident" by the American media, and the harm it caused to Sony was immeasurable. In addition to the sieve-like network loopholes being ridiculed by the entire United States, the company was collectively sued by employees, which made Sony go crazy for a period of time Shooting a sci-fi thriller, I don’t know if my brain is cramped with fright.
In short, Sony, which has always been known for its black technology, has become a playground for hackers to come and go. This incident has aroused great vigilance from Hollywood companies, and they have invested huge sums of money to strengthen the construction of the company's firewall.
New Era Films has encountered the biggest crisis since its establishment, so that Yang Cheng, the big boss of the head office, had to stop and pay attention. The film company has been under great pressure since Donna Rondo.
Back in the office, Yang Cheng came out of the elevator and asked without stopping for a moment, "How is it going? Is there any new news?"
Su Su quickly replied, "Ms. Lang De wrote back to the hacker to try to negotiate, but the other party did not respond."
This was already in Yang Cheng's expectation, "They won't reply, just check the source directly, I want to know where the source of the film was leaked, if it was really hacked in from the Internet, then the Network Security Department can collectively resigned."
Yang Cheng's murderous words happened to be heard by Eddie who had just stepped out of the elevator. As the CEO of the head office, whether it was his responsibility or not, he couldn't absolve himself of the blame.
So without any hesitation, he admitted his mistake first, "Boss, I am responsible for this matter, and I should strengthen the preventive measures of the database in advance."
Yang Cheng glanced at him in surprise, "What's wrong with you?"
But he didn't bother to listen to Eddie's explanation, "All right, all right, let's talk about things quickly."
Eddie smiled wryly,
"I just want to talk about the theft of film sources. When I was working in the Los Angeles Times in the early years, I often heard that Hollywood company film sources were stolen. The crimes happened spontaneously due to various reasons, and most of the cases have instigators behind them, among which Harvey Weinstein is the most rampant player of this kind of dirty tricks."
Yang Cheng folded his shoulders and frowned as he looked at Eddie, "Harvey Weinstein? You don't want to say that our film sources leaked, and he was behind it, right?"
Eddie shook his head again and again, "No, I have no evidence, but it's okay to list him as a suspect. From the perspective of probability, he is the most suspected, but it cannot be ruled out that competitors are playing tricks.
In the past, technology was underdeveloped, and Hollywood companies’ supervision of film sources was not strict. However, with the strengthening of measures by major companies, the means of stealing film sources have also become diverse. After all, peers know peers best, and only peers compete Opponents are the easiest to find the weak points of your defenses.
One of the more common methods in the past was remakes and bootleg recordings when ordering screenings in advance. Of course, the clarity of this method is too poor and unstable, and the viewing effect is not good. The impact will not cause too much loss. When a company holds a premiere, it will especially strengthen the management of candid shots, so this method is slowly disappearing
At present, the most affected and most common means of being leaked are mostly clear versions or even more private "mao movie versions". One month before the release of "Wolverine", there was news that the clear and full version of resources could be downloaded online. .
Some people thought it was a joke, but some unbelievers really found download resources on the Internet. This version has not yet added complete music and special effects, and even the steel wires hanging behind the actors have not been erased. "Wolverine", online It spread wildly, and finally downloaded more than 15 million times. If 5 million of them will go to the theater to watch the movie, it can also bring hundreds of millions of box office increments to the movie.
Of course, this kind of assumption is an afterthought, but it can’t be wrong. After all, things that didn’t happen can be predicted in any way.
The producer, Twentieth Century Fox, took emergency measures in a timely manner and issued warnings through various channels. Whether it is the person who first leaked or the person who spread it later, they will file a lawsuit according to law, and invite F~B~I and MPAA to intervene in the investigation. To make an example of others, a Fox News columnist was soon fired for publishing a leaked version of "Wolverine" film review, and F~B~I also raided a data center in Dallas.
But it still failed to recover the huge loss caused by the leak of the film source! "
american enjoy life
american enjoy life